In this article we will look at the arguments of why it’s important to be aware of more of the threats of using third-party software.
In this article we will look at what the shellshock bashbug is all about. We also cover mitigation strategies to help you thwart against such a vulnerability, so that when the next one occurs you are ready.
This article takes a look at the differences between an Active Directory group and organizationl unit.
Check Point VPN-1 UTM was selected the winner in the Firewall Solution category of the WindowSecurity.com Readers' Choice Awards. Palo Alto Networks VM-Series and Panda Cloud Office Protection were runner-up and second runner-up respectively.
Event Log Consolidator allows you to view, consolidate, and dismiss event logs and correlate issues among multiple Windows systems quickly and easily from one central location.
SSL protocol 3.0 uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack.